0

testing Online Quiz - 48

Description: testing Online Quiz - 48
Number of Questions: 20
Created by:
Tags: testing
Attempted 0/20 Correct 0 Score 0
  1. Rely on Path Based Testing

  2. Exercise the Logical Conditions in a Program module

  3. Select Test Paths based on the locations and uses of variables

  4. Focus on Testing the Validity of loop constructs


Correct Option: B

Data Flow Testing is a control structure Testing Technique where the criteria used to design test cases is that they

  1. Rely on Path Based Testing

  2. Exercise the Logical Conditions in a Program module

  3. Select Test Paths based on the locations and uses of variables

  4. Focus on Testing the Validity of loop constructs


Correct Option: C
  1. Incorrect or Missing functions

  2. Interface Errors

  3. Performance Errors

  4. All of the Above

  5. None of the Above


Correct Option: D
  1. Conventional Software Testing

  2. Operations and classes that are Critical or Suspect

  3. Use-Case Validation

  4. White-Box Testing of Operator Algorithms


Correct Option: B
  1. Boundary Value Analysis

  2. Error Guessing

  3. Equivalence Partitioning

  4. Both B and C


Correct Option: C
  1. Observability

  2. Simplicity

  3. Stability

  4. All of the Above


Correct Option: D
  1. Statement Coverage

  2. Path Coverage

  3. Branch Coverage

  4. None of the Above


Correct Option: A
  1. Authentication

  2. Authorization

  3. Integrity

  4. Availability

  5. Confidentiality


Correct Option: A,B,C,D,E

Key words used for SQL Injection attack (select more than one)

  1. CREATE

  2. UNION

  3. WHERE

  4. OR


Correct Option: B,D
  1. Website with URL https

  2. Website with URL http

  3. Windows application

  4. Only Website with URL http & Windows application


Correct Option: A,B,C
  1. Buffer overflows

  2. SQL Injection

  3. Cross site scripting

  4. Authentication

  5. Authorization


Correct Option: A,B,C
  1. Denial of service

  2. Executing malicious content

  3. Information disclosure

  4. All of the above


Correct Option: D
  1. Windows authentication

  2. SQL authentication

  3. Form based authentication

  4. Basic authentication

  5. Passport authentication

  6. All of the above


Correct Option: A,C,D,E
  1. SqlDataAdapter myCommand = new SqlDataAdapter( "SELECT CustomerName, Email, PhoneNo FROM users WHERE cust_id = '" + txtuser.Text + "'", myConnection);

  2. CREATE PROCEDURE procGetUser @custId VARCHAR(5) AS SELECT CustomerName, Email, PhoneNo FROM Customers WHERE cust_id = @custId

  3. SqlDataAdapter myDataAdapter = new SqlDataAdapter("SELECT CustomerName, Email, PhoneNo FROM Customers WHERE cust_id = @cust_id", connection); myCommand.SelectCommand.Parameters.Add("@cust_id", SqlDbType.VarChar,

  4. All the above


Correct Option: A
  1. Provide highest privilege

  2. Encode all client supplied data

  3. Use of parameterized stored procedure

  4. Providing detailed error message


Correct Option: B,C,D

Select the threat category for the below request-response Web Request - http://www.somesite.com/page.asp?pageid=10&lang=en&title=Section%20Title Response -

Section Title

  1. SQL Injection

  2. Cross Site Scripting

  3. Authentication

  4. Forceful browsing


Correct Option: B
- Hide questions